Kashif Saleem received M.E. and Ph.D. in Electrical Engineering from University Technology Malaysia in 2007 and 2011, respectively. Besides, he took professional training and certifications from MIT, IBM, Microsoft, and Cisco. Currently, Dr.Saleem is an Associate Professor at the Center of Excellence in Information Assurance (CoEIA), King Saud University. Moreover, he is serving as Associate Editor of the Journal of Multimedia Information System (JMIS), IEEE Access, International Journal of E-Health and Medical Communications (IJEHMC), The International Journal of Cyber-Security and Digital Forensics (IJCSDF). Dr. Saleem has organized International and local events and served as a TPC member of numerous international conferences and workshops. He has authored and coauthored over 100 papers in refereed international journals and conferences. Dr. Saleem acquired several research grants in KSA, EU, and the other parts of the world. His research interests include telecommunication, computer security, wireless communication, wireless security, artificial intelligence, and bioinformatics.
Recently, reliable data transport in wireless sensor network becomes very crucial for real-time a... more Recently, reliable data transport in wireless sensor network becomes very crucial for real-time application with different application requirements. Real time multimedia application requires large bandwidth and big memory in the network in order to send video data and needs to arrive at destination in time. Data that arrives at the receiver not in time will be discarded and cannot be played because loss recovery through retransmission of data loss may introduce long delays. Therefore, an implementation of transport protocol in wireless sensor network for multimedia application is a challenging task. Traditional protocol likes TCP and UDP cannot directly applied for real-time communication over wireless sensor network because the lack of functions of real-time services and the unique characteristics of sensor node itself. However there is another transport protocol which is the Stream Control Transmission Protocol (SCTP) that provides multi-stream service for single connection. This ...
In above article [1] , reference [11] is incorrect as the conference article had not been publish... more In above article [1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2] . Therefore, the sentences in the article [1] with reference [11] should be cited [2] in this article as “When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds [2] ,” “Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing [2] and [3] ,” and “However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted [2] .”
Makerspace is an innovative concept of working in a community based, semi-organized groups workin... more Makerspace is an innovative concept of working in a community based, semi-organized groups working to tinker, design, fabricate or develop, and market the ideas. The involvement of the community is vital to the success of every application of the makerspace concept. Some areas, like Science, Technology, Engineering, and Management (STEM) are among the extremely popular areas in the makerspace, while other popular areas include programming, and curriculum development. In such areas, where the community involvement is expected to be high, it is possible that the makerspace can’t accommodate all the individuals along with their equipment, at one place. Since the cost to develop the makerspace is high, we will be interested to see that how the small makerspaces can interact with the central makerspace to share the ideas and resources. In this paper, we investigate the popular areas of community involvement, opportunities and challenges in forming the distributed makerspaces, and also provide the analyses of their productivity in terms of problems solving, fabrication of small components, and software development. A model is proposed that provides a framework of conducting activities in distributed makerspaces and integrating the activities (project components) to form a product.
The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—h... more The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To id...
2019 International Conference on Computer and Information Sciences (ICCIS)
Nowadays, the current trend in research is going towards the combination of the Cloud and Interne... more Nowadays, the current trend in research is going towards the combination of the Cloud and Internet of Things. This interplay is referred to as Cloud of Things (CoT). CoT aimed to provide pervasive and ubiquitous computing, in which IoT capabilities are provisioned as services (e.g., sensing as a service) in an on-demand fashion. However, smart services that characterized as real-time and delay-sensitive require energy efficient CoT architectures. This paper surveys CoT architectures, platforms and the application of CoT in the context of healthcare. Moreover, the paper mainly emphasizes on investigating and discussing the most relevant energy efficiency proposals. The investigation of such works reveals that further efforts are still required to obtain energy-efficient CoT architectures, particularly in healthcare, in which the tradeoffs between energy efficiency, delay, and quality of service is considered.
Anais do Simpósio Brasileiro de Computação Aplicada à Saúde (SBCAS)
Smart decision support systems (DSSs) have been successfully employed in several areas. In health... more Smart decision support systems (DSSs) have been successfully employed in several areas. In healthcare, these systems offer solutions for uncertain reliably acts and moments. Systems based on Bayesian networks (BNs) can generate predictions even in information lack situations. This paper proposes the modeling and presents a performance evaluation study of the Bayesian classifier named Tree Augmented Na¨ıve Bayes (TAN). Results show that the proposed algorithm obtained good performance for a pregnancy database, presenting F-measure 0.92, Kappa statistic 0.8932, and ROC area 0.993. The proposed method allows representing more complex connections between variables. Nevertheless, it requires major computational effort and time that are not needed in other Bayesian algorithms.
The increasing use of interconnected sensors to monitor patients with chronic diseases, integrate... more The increasing use of interconnected sensors to monitor patients with chronic diseases, integrated with tools for the management of shared information, can guarantee a better performance of health information systems (HISs) by performing personalized healthcare. The early diagnosis of chronic diseases such as hypertensive disorders of pregnancy represents a significant challenge in women’s healthcare. Computational learning techniques are useful tools for pattern recognition in the assessment of an increasing amount of integrated data related to these diseases. Hence, in this paper, the use of machine learning (ML) techniques is proposed for the assessment of real data referred to hypertensive disorders in pregnancy. The results show that the averaged one-dependence estimator algorithm can help in the decision- making process in uncertain moments, thus improving the early detection of these chronic diseases. The best-evaluated computational learning algorithm improves the performance of HISs through its precise diagnosis. This method can be applied in electronic health (e-health) environments as a useful tool for handling uncertainty in the decision-making process related to high-risk pregnancy.
Abstract The microservice recommendation mechanism, as a key supporting technology for providing ... more Abstract The microservice recommendation mechanism, as a key supporting technology for providing users with intelligent and proactive application services, is one of the important research contents in mobile social networks. In this paper, a recommendation mechanism of mobile social network service based on user trajectory, trust network and collaborative filtering algorithm is proposed. The user trajectory prediction model based on Generative Adversarial Network (GAN) is introduced into the process of service recommendation, and combined with trust degree to constitute the 3D service recommendation model of user-service-trajectory prediction. This method improves the accuracy and reliability of service recommendation and avoids the blindness and randomness of service recommendation. The simulation experiments show that the service recommendation algorithm has higher accuracy than the traditional collaborative filtering algorithm.
Among the numerous alternatives used in the world of risk balance, it highlights the provision of... more Among the numerous alternatives used in the world of risk balance, it highlights the provision of guarantees in the formalization of credit agreements. The objective of this paper is to compare the achievement of fuzzy sets with that of artificial neural network-based decision trees on credit scoring to predict the recovered value using a sample of 1890 borrowers. Comparing with fuzzy logic, the decision analytic approach can more easily present the outcomes of the analysis. On the other hand, fuzzy logic makes some implicit assumptions that may make it even harder for credit-grantors to follow the logical decision-making process. This paper leads an initial study of collateral as a variable in the calculation of the credit scoring. The study concludes that the two models make modelling of uncertainty in the credit scoring process possible. Although more difficult to implement, fuzzy logic is more accurate for modelling the uncertainty. However, the decision tree model is more favourable to the presentation of the problem.
Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through ... more Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal. However, over simplified implementations of Bluetooth low energy (BLE) protocol in eHealth sector is susceptible to several wireless attacks, in particular the Man-in-the-Middle (MITM) attack. The issue arises due to a lack of mutual authentication and integrity protection between the communicating devices, which may lead to compromise of confidentiality, availability and even the integrity of this safety-critical information. This research paper presents a novel framework named MARC to detect, analyze, and mitigate Bluetooth security flaws while focusing upon MITM attack against NiNo devices. For this purpose, a comprehensive solution has been proposed, which can detect MITM signatures based upon four novel anomaly detection metrics: analyzing Malicious scan requests, Advertisement intervals, RSSI levels, and Cloned node addresses. The proposed solution has been evaluated through practical implementation and demonstration of different attack scenarios, which show promising results concerning accurate and efficient detection of MITM attacks.
Computer security is something that brings to mind the greatest developers and companies who wish... more Computer security is something that brings to mind the greatest developers and companies who wish to protect their data. Major steps forward are being taken via advances made in the security of technology. The main purpose of this paper is to provide a view of different mechanisms and algorithms used to ensure big data security and to theoretically put forward an improvement in the health-based environment using a proposed model as reference. A search was conducted for information from scientific databases as Google Scholar, IEEE Xplore, Science Direct, Web of Science, and Scopus to find information related to security in big data. The search criteria used were “big data”, “health”, “cloud”, and “security”, with dates being confined to the period from 2008 to the present time. After analyzing the different solutions, two security alternatives are proposed combining different techniques analyzed in the state of the art, with a view to providing existing information on the big data ov...
A Certificate Authority (CA) provides the critical authentication and security services for Publi... more A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security
Abstract The Internet-of-Things (IoT) represents the next groundbreaking change in information an... more Abstract The Internet-of-Things (IoT) represents the next groundbreaking change in information and communication technology (ICT) after the Internet. IoT is concerned with making everything connected and accessible through the Internet. However, IoT objects (things) are characterized by constrained computing and storage resources. Therefore, the Cloud of Things (CoT) paradigm that integrates the Cloud with IoT is proposed to meet the IoT requirements. In CoT, the IoT capabilities (e.g., sensing) are provisioned as services. Unfortunately, the two-tier CoT model is not efficient in the use cases sensitive to delays and energy consumption (e.g., in healthcare). Consequently, Fog Computing is proposed to support such IoT services and applications. This paper reviews the most relevant Fog-enabled CoT system models and proposes an energy-aware allocation strategy for placing application modules (tasks) on Fog devices. Finally, the performance of the proposed strategy is evaluated in comparison with the default allocation and Cloud-only policies, using the iFogSim simulator. The proposed solution was observed to be more energy-efficient, saving approximately 2.72% of the energy compared to Cloud-only and approximately 1.6% of the energy compared to the Fog-default.
Recently, reliable data transport in wireless sensor network becomes very crucial for real-time a... more Recently, reliable data transport in wireless sensor network becomes very crucial for real-time application with different application requirements. Real time multimedia application requires large bandwidth and big memory in the network in order to send video data and needs to arrive at destination in time. Data that arrives at the receiver not in time will be discarded and cannot be played because loss recovery through retransmission of data loss may introduce long delays. Therefore, an implementation of transport protocol in wireless sensor network for multimedia application is a challenging task. Traditional protocol likes TCP and UDP cannot directly applied for real-time communication over wireless sensor network because the lack of functions of real-time services and the unique characteristics of sensor node itself. However there is another transport protocol which is the Stream Control Transmission Protocol (SCTP) that provides multi-stream service for single connection. This ...
In above article [1] , reference [11] is incorrect as the conference article had not been publish... more In above article [1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2] . Therefore, the sentences in the article [1] with reference [11] should be cited [2] in this article as “When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds [2] ,” “Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing [2] and [3] ,” and “However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted [2] .”
Makerspace is an innovative concept of working in a community based, semi-organized groups workin... more Makerspace is an innovative concept of working in a community based, semi-organized groups working to tinker, design, fabricate or develop, and market the ideas. The involvement of the community is vital to the success of every application of the makerspace concept. Some areas, like Science, Technology, Engineering, and Management (STEM) are among the extremely popular areas in the makerspace, while other popular areas include programming, and curriculum development. In such areas, where the community involvement is expected to be high, it is possible that the makerspace can’t accommodate all the individuals along with their equipment, at one place. Since the cost to develop the makerspace is high, we will be interested to see that how the small makerspaces can interact with the central makerspace to share the ideas and resources. In this paper, we investigate the popular areas of community involvement, opportunities and challenges in forming the distributed makerspaces, and also provide the analyses of their productivity in terms of problems solving, fabrication of small components, and software development. A model is proposed that provides a framework of conducting activities in distributed makerspaces and integrating the activities (project components) to form a product.
The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—h... more The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To id...
2019 International Conference on Computer and Information Sciences (ICCIS)
Nowadays, the current trend in research is going towards the combination of the Cloud and Interne... more Nowadays, the current trend in research is going towards the combination of the Cloud and Internet of Things. This interplay is referred to as Cloud of Things (CoT). CoT aimed to provide pervasive and ubiquitous computing, in which IoT capabilities are provisioned as services (e.g., sensing as a service) in an on-demand fashion. However, smart services that characterized as real-time and delay-sensitive require energy efficient CoT architectures. This paper surveys CoT architectures, platforms and the application of CoT in the context of healthcare. Moreover, the paper mainly emphasizes on investigating and discussing the most relevant energy efficiency proposals. The investigation of such works reveals that further efforts are still required to obtain energy-efficient CoT architectures, particularly in healthcare, in which the tradeoffs between energy efficiency, delay, and quality of service is considered.
Anais do Simpósio Brasileiro de Computação Aplicada à Saúde (SBCAS)
Smart decision support systems (DSSs) have been successfully employed in several areas. In health... more Smart decision support systems (DSSs) have been successfully employed in several areas. In healthcare, these systems offer solutions for uncertain reliably acts and moments. Systems based on Bayesian networks (BNs) can generate predictions even in information lack situations. This paper proposes the modeling and presents a performance evaluation study of the Bayesian classifier named Tree Augmented Na¨ıve Bayes (TAN). Results show that the proposed algorithm obtained good performance for a pregnancy database, presenting F-measure 0.92, Kappa statistic 0.8932, and ROC area 0.993. The proposed method allows representing more complex connections between variables. Nevertheless, it requires major computational effort and time that are not needed in other Bayesian algorithms.
The increasing use of interconnected sensors to monitor patients with chronic diseases, integrate... more The increasing use of interconnected sensors to monitor patients with chronic diseases, integrated with tools for the management of shared information, can guarantee a better performance of health information systems (HISs) by performing personalized healthcare. The early diagnosis of chronic diseases such as hypertensive disorders of pregnancy represents a significant challenge in women’s healthcare. Computational learning techniques are useful tools for pattern recognition in the assessment of an increasing amount of integrated data related to these diseases. Hence, in this paper, the use of machine learning (ML) techniques is proposed for the assessment of real data referred to hypertensive disorders in pregnancy. The results show that the averaged one-dependence estimator algorithm can help in the decision- making process in uncertain moments, thus improving the early detection of these chronic diseases. The best-evaluated computational learning algorithm improves the performance of HISs through its precise diagnosis. This method can be applied in electronic health (e-health) environments as a useful tool for handling uncertainty in the decision-making process related to high-risk pregnancy.
Abstract The microservice recommendation mechanism, as a key supporting technology for providing ... more Abstract The microservice recommendation mechanism, as a key supporting technology for providing users with intelligent and proactive application services, is one of the important research contents in mobile social networks. In this paper, a recommendation mechanism of mobile social network service based on user trajectory, trust network and collaborative filtering algorithm is proposed. The user trajectory prediction model based on Generative Adversarial Network (GAN) is introduced into the process of service recommendation, and combined with trust degree to constitute the 3D service recommendation model of user-service-trajectory prediction. This method improves the accuracy and reliability of service recommendation and avoids the blindness and randomness of service recommendation. The simulation experiments show that the service recommendation algorithm has higher accuracy than the traditional collaborative filtering algorithm.
Among the numerous alternatives used in the world of risk balance, it highlights the provision of... more Among the numerous alternatives used in the world of risk balance, it highlights the provision of guarantees in the formalization of credit agreements. The objective of this paper is to compare the achievement of fuzzy sets with that of artificial neural network-based decision trees on credit scoring to predict the recovered value using a sample of 1890 borrowers. Comparing with fuzzy logic, the decision analytic approach can more easily present the outcomes of the analysis. On the other hand, fuzzy logic makes some implicit assumptions that may make it even harder for credit-grantors to follow the logical decision-making process. This paper leads an initial study of collateral as a variable in the calculation of the credit scoring. The study concludes that the two models make modelling of uncertainty in the credit scoring process possible. Although more difficult to implement, fuzzy logic is more accurate for modelling the uncertainty. However, the decision tree model is more favourable to the presentation of the problem.
Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through ... more Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal. However, over simplified implementations of Bluetooth low energy (BLE) protocol in eHealth sector is susceptible to several wireless attacks, in particular the Man-in-the-Middle (MITM) attack. The issue arises due to a lack of mutual authentication and integrity protection between the communicating devices, which may lead to compromise of confidentiality, availability and even the integrity of this safety-critical information. This research paper presents a novel framework named MARC to detect, analyze, and mitigate Bluetooth security flaws while focusing upon MITM attack against NiNo devices. For this purpose, a comprehensive solution has been proposed, which can detect MITM signatures based upon four novel anomaly detection metrics: analyzing Malicious scan requests, Advertisement intervals, RSSI levels, and Cloned node addresses. The proposed solution has been evaluated through practical implementation and demonstration of different attack scenarios, which show promising results concerning accurate and efficient detection of MITM attacks.
Computer security is something that brings to mind the greatest developers and companies who wish... more Computer security is something that brings to mind the greatest developers and companies who wish to protect their data. Major steps forward are being taken via advances made in the security of technology. The main purpose of this paper is to provide a view of different mechanisms and algorithms used to ensure big data security and to theoretically put forward an improvement in the health-based environment using a proposed model as reference. A search was conducted for information from scientific databases as Google Scholar, IEEE Xplore, Science Direct, Web of Science, and Scopus to find information related to security in big data. The search criteria used were “big data”, “health”, “cloud”, and “security”, with dates being confined to the period from 2008 to the present time. After analyzing the different solutions, two security alternatives are proposed combining different techniques analyzed in the state of the art, with a view to providing existing information on the big data ov...
A Certificate Authority (CA) provides the critical authentication and security services for Publi... more A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security
Abstract The Internet-of-Things (IoT) represents the next groundbreaking change in information an... more Abstract The Internet-of-Things (IoT) represents the next groundbreaking change in information and communication technology (ICT) after the Internet. IoT is concerned with making everything connected and accessible through the Internet. However, IoT objects (things) are characterized by constrained computing and storage resources. Therefore, the Cloud of Things (CoT) paradigm that integrates the Cloud with IoT is proposed to meet the IoT requirements. In CoT, the IoT capabilities (e.g., sensing) are provisioned as services. Unfortunately, the two-tier CoT model is not efficient in the use cases sensitive to delays and energy consumption (e.g., in healthcare). Consequently, Fog Computing is proposed to support such IoT services and applications. This paper reviews the most relevant Fog-enabled CoT system models and proposes an energy-aware allocation strategy for placing application modules (tasks) on Fog devices. Finally, the performance of the proposed strategy is evaluated in comparison with the default allocation and Cloud-only policies, using the iFogSim simulator. The proposed solution was observed to be more energy-efficient, saving approximately 2.72% of the energy compared to Cloud-only and approximately 1.6% of the energy compared to the Fog-default.
Uploads
Papers by Kashif Saleem